gnome evolution CVE-2005-0102 in GNOME and Debian Products
Published on January 24, 2005

product logo product logo
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2005-0102

stack.watch emails you whenever new vulnerabilities are published in GNOME Evolution or Debian Linux. Just hit a watch button to start following.

 
 

Exploit Probability

EPSS
0.60%
Percentile
69.05%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.